CVE-2026-42897
Microsoft · Exchange Server
A cross-site scripting (XSS) vulnerability in Microsoft Exchange Server allows unauthenticated attackers to perform spoofing over a network.
Executive summary
Microsoft Exchange Server is susceptible to an actively exploited cross-site scripting vulnerability that allows unauthenticated attackers to perform spoofing attacks.
Vulnerability
This is a cross-site scripting (XSS) vulnerability caused by improper input neutralization, which can be leveraged by an unauthenticated attacker to execute malicious scripts in the context of the victim's session.
Business impact
Successful exploitation allows attackers to spoof communications, potentially leading to phishing, credential theft, or unauthorized actions within the Exchange environment. The CVSS score of 8.1 and the confirmation of active exploitation classify this as a high-urgency issue.
Remediation
Immediate Action: Apply the latest vendor security updates immediately to mitigate the risk of active exploitation.
Proactive Monitoring: Monitor Exchange logs for suspicious web requests containing script tags or abnormal patterns targeting web-based interfaces.
Compensating Controls: Use a Web Application Firewall (WAF) to filter malicious input strings and block known XSS attack vectors targeting Exchange services.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Due to confirmed active exploitation, this CVE requires immediate attention. Security teams should prioritize patching all affected Microsoft Exchange instances to prevent potential spoofing and unauthorized access.